US5848418A - Electronic file analyzer and selector - Google Patents

Electronic file analyzer and selector Download PDF

Info

Publication number
US5848418A
US5848418A US08/802,118 US80211897A US5848418A US 5848418 A US5848418 A US 5848418A US 80211897 A US80211897 A US 80211897A US 5848418 A US5848418 A US 5848418A
Authority
US
United States
Prior art keywords
file
type property
graphics
suffix
files
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US08/802,118
Inventor
Peter Andre de Souza
Michael F. Angelo
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SILICON VALLEY FINANCIAL SERVICES
Original Assignee
WatchSoft Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WatchSoft Inc filed Critical WatchSoft Inc
Priority to US08/802,118 priority Critical patent/US5848418A/en
Assigned to WATCHSOFT, INC. reassignment WATCHSOFT, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ANGELO, MICHAEL F., DE SOUZA, PETER ANDRE
Assigned to SILICON VALLEY FINANCIAL SERVICES reassignment SILICON VALLEY FINANCIAL SERVICES ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: WATCHSOFT, INC.
Application granted granted Critical
Publication of US5848418A publication Critical patent/US5848418A/en
Assigned to WATCHSOFT, INC. reassignment WATCHSOFT, INC. RELEASE Assignors: SILICON VALLEY BANK
Anticipated expiration legal-status Critical
Application status is Expired - Lifetime legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching
    • Y10S707/99936Pattern matching access
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99943Generating database or data structure, e.g. via user interface
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99951File or database maintenance
    • Y10S707/99952Coherency, e.g. same view to multiple users
    • Y10S707/99953Recoverability

Abstract

An apparatus and method for finding objectionable material contained within electronic files is presented. The apparatus consists of a computer system that is provided with a computer, a video display, a buffer memory, and at least one electronic file storage device capable of storing electronic files. Each of the electronic files is stored according to an operating system which incorporates a file name and a file name suffix. The method includes provisions for a real type property, a claimed type property, and a result type property for each electronic file. All of the electronic files are located on each of said storage devices for checking. During the checking process, for example, each file is checked to determine the file's real type property. If the checked file is determined to be a graphics file, then the file will be identified as a graphics file. If the file is not a graphics file, (i.e., it is a text file) then it is interrogated in order to determine if the text contains objectionable language. If objectionable language is found, then the text file is flagged as suspicious or questionable. A listing of all suspicious, questionable, or graphics files are presented to the user who may then review the file for further processing or destroy it.

Description

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to an apparatus and method for reviewing electronic documents. More particularly, the present invention relates to an apparatus and method for locating and analyzing electronic documents that contain graphic images or objectionable language and presenting a list of such files to a user for review and destruction or some other action.

2. Description of the Related Art

The widespread use of personal computers (PC's), coupled with easy access to computer networks such as the Internet and electronic bulletin board systems (BBS's), has provided unprecedented access to adult subject matter for children. This adult subject matter consists of pornographic literature and photographs, descriptions of violent activities, and potential illegal activities, not to mention the use of offensive language. This material can be stored in electronic files that are easily copied from one computer system to another. The electronic files can contain graphic images (graphics type files) and text information (text type files). Some text documents, such as those written on word processors, can contain both text, graphic images, and audio clips.

There are software products available to prevent children from accessing portions of the Internet known to contain offensive material. Software products such as Net Nanny or other channel blockers and screeners, perform a guardian function by restricting children from accessing certain areas of the Internet known to harbor adult subject matter. Unfortunately, not all adult subject matter is limited to the Internet. The subject matter is also available on many electronic bulletin boards. In addition, children can gain access to adult subject matter by using their friend's PC's that are not equipped with Net Nanny or similar software protections. Once downloaded to their friend's PC, the offensive material can be copied onto floppy disks and transferred to the home PC, thereby circumventing Net Nanny. Aside from the problems with children, many corporations also have a similar unfilled need to find files with language that may expose the company to lawsuits for sexual harassment or illegal activity. There is, therefore, a need for an apparatus and method that identifies those files containing pre-selected objectionable subject matter on a PC or network system. It is an object of the present invention to remedy the problems inherent in the related art.

SUMMARY OF THE INVENTION

The present invention overcomes the disadvantages and limitations of the related art by providing an apparatus and method for finding objectionable material contained within electronic files, either on a PC or on a network.

The apparatus consists of a computer system that is provided with a microprocessor (or computer), a video display, a buffer memory, and at least one electronic file storage device capable of storing electronic files. Each of the electronic files is stored according to an operating system which incorporates a file name, a file name suffix, a mode, a time-stamp, and a file size. The method includes provisions for a real type property, a claimed type property, and a result type property for each electronic file. All of the electronic files are located on each of the storage devices.

The method of the present invention checks each file to determine the file's real type property. This is accomplished by reading all or a portion of the file to determine the file's signature. If the file signature is present, then it is compared to a library of known file signatures. If the file signature found is not among the library of known signatures, then the file is sent through a graphics filter to determine if the file is a graphics type of file or an audio clip, otherwise, the real property is set to unknown. Next, the file name suffix is checked against a library of file suffixes. If the file's suffix is among the list of suffixes, the claimed property is set to that suffix type. Otherwise, the claimed type is set to unknown. Graphics files and audio clips are automatically designated as questionable, prompting review by the user. Graphics files can include video and or movies. Text files have additional processing, including searches for words or terms related to topics that are inappropriate or potentially dangerous for certain users such as children. The checking process also looks for files that are disguised, such as a file with an executable suffix (.exe) which in reality is a graphics file that should have had a graphics suffix (like .gif). Finally, the checking process also looks for files that are hidden so that they are not listed in response to a directory command.

A listing of all suspicious, questionable, or graphics files are presented to the user. Reasons as to why the file was flagged are also presented. Once all of the flagged files are listed, the user is free to review or destroy the identified files.

DESCRIPTION OF THE DRAWINGS

For a more complete understanding of the present invention and the advantages thereof, reference should be made to the following Detailed Description taken in connection with the accompanying drawings in which:

FIG. 1 illustrates a computer system with which the preferred embodiment of the present invention is implemented;

FIG. 2 is a flowchart diagram of the overall process that is the preferred embodiment of the present invention for finding objectionable material in electronic files;

FIG. 3 is a flowchart diagram of a portion of the preferred embodiment of the present invention for finding objectionable material in electronic files;

FIG. 4 is a flowchart diagram of a portion of the preferred embodiment of the present invention for finding objectionable material in electronic files;

FIG. 5 is a flowchart diagram of a portion of the preferred embodiment of the present invention for finding objectionable material in electronic files; and

FIG. 6 is example computer code of a record that contains information about an electronic file that is utilized by an alternate embodiment of the present invention.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

The apparatus of the preferred embodiment is shown in FIG. 1. The preferred apparatus is a personal computer (PC) in the form of a computer system 10 that has a data bus 11 to which are connected a variety of devices, namely: microprocessor (computer) 14, display monitor 12, modem 16, mouse 18, keyboard 20, floppy disk drives 22 and 24, one or more hard disk drives 26, and CD-ROM drive 28. The bus 11 contains a set of data lines, a set of address lines and a set of control lines. These various lines are used to transfer data from one device to another. For example, data in the form of an electronic file can be read from hard disk drive 26 and written to the microprocessor 14 for processing. Similarly, output from the microprocessor 14 can be written to floppy drive 22 via the data bus 11. Additional input/output devices may be attached to the computer system 10, including tablets, touch screens, light pens, joysticks, trackballs, and similar devices. Personal computer architecture and components are further explained in U.S. Pat. No. 5,572,207 by Harding, which is specifically incorporated herein by reference for all purposes. Alternate embodiments of computer system 10 may include mainframe computers, or networks of PC's that share a common file server or other storage media (not shown).

The overall method 200 of finding objectionable material within a computer system 10 is shown in FIG. 2.

Referring to FIG. 2, first, in step 202, the number of storage devices is determined. As described before, storage devices may consist of floppy disk drives 22 and 24 (if they have disks loaded) and other storage devices such hard disk drive 26 and CD-ROM drive 28. Alternate storage devices, such as random access memory (RAM), tape drives, and compressed "zip" drives may also be included in the process of the present invention so long as they can be properly connected to and utilized by computer system 10.

In step 204, for each storage device located in step 202, all of the electronic files stored on the storage device are located. The process of the present invention provides a record of information for each of the electronic files found in step 204. Example code of this record, utilizing the Object Pascal programming language, is shown in FIG. 6. It will be understood by those skilled in the art that other programming languages, such as C and C++ among others, could be used equally well to program computer system 10. Referring to FIG. 6, the record 600 contains a variety of file properties. The name of the property, and a brief description of the property, is given in the table below:

__________________________________________________________________________Property Description__________________________________________________________________________Size 602 The number of bytes taken up by the file on the storage device.Date Time 604    Indicates the time stamp (i.e. the date and time) when the file    was created or    last modified).Mode 606 The mode of file storage (e.g., hidden, archive, etc.).Color Code 608    The color code is itself a record containing integer values for    the amount of    red, yellow, and blue that are used to color an icon that is    presented to the    user. The color of the icon is used to indicate the type of file    found.File Name 610    The name associated with the electronic file. This name is the    one obtained    directly from the operating system such as Microsoft Windows,    OS2, UNIX,    or the Macintosh OS.File Signature 611    The file signature is typically contained within the "header"    portion of the file,    i.e., the first few bytes. Many proprietary file formats place a    characteristic    series of bytes at the beginning of a formatted file that    designates the file as    being created by the particular software program and conforming    that format.File Suffix 612    The file suffix is typically the three character designation    that is appended to    File Name 610. Typical file suffixes are ".exe" for executable    programs,    ".bat" for batch files, ".doc" for word processor documents, and    ".gif" for    graphics files.Reason 614    This string variable contains an explanation of why the file was    selected for    presentation to the user.Real Type 616    This variable contains a code designating the actual type of    file found by    analyzing the contents of the file such as the File Signature    611.Claimed Type 618    This variable contains a code designating the claimed type of    file found by    examining the File Suffix 612.Result Type 620    This variable contains a code designating the presentation    category for the    file, i.e., this code specifies whether or not the file    information will be    presented to the user and under which category.__________________________________________________________________________

Referring again to FIG. 2, step 206, all, or at least a portion of, the contents of each file is analyzed. Next, in step 208, a decision is made whether or not the contents of the file contains text only or if the file contains a graphics image or audio clip. If the file checked in step 208 is a graphics file or audio clip, the file will be handled in step 210. If the file checked in step 208 contains text (as well as graphic images and audio clips), then the file is handled in step 212 as a text file. It will be understood by those skilled in the art that an audio/video clip including movies and AVI's may be found in the same manner as a graphic image, either independently or embedded within a text file. In the following detailed description, the term audio clip may be substituted for the term graphics image as both types of files are searched for contemporaneously and in an similar or equivalent manner known in the art.

FIG. 3 is a flowchart of a sub-process for checking electronic files. Specifically, the steps shown in FIG. 3 are encompassed by step 206 of FIG. 2. In the process of locating files (step 204 of FIG. 2), the size of the file, its time-stamp, its file name, file suffix and mode are read and placed into the file size property 602, the date time property 604 the file name property 610, the file suffix property 612, and the mode property 606, respectively. This information is typically available via the computer system 10 operating system. In step 302, the file's signature is read. Although file signatures are not mandatory, it is customary within the art to reserve a series of bytes at the beginning of an electronic file for designating the proprietary format of the file. This allows other software programs and the operating system to recognize electronic files as "belonging" to the particular software program--thus the designation "signature." The file signature is normally placed in the first series of bytes in the file that is called the "header." Aside from the file signature, additional bytes of a file may be read in order to find graphics files hidden near the end of text documents.

The file signature, if one is found, is loaded into the file record's file signature property 611. In step 302, the file signature property 611 is checked against a list or library of known file signatures. In step 304 it is determined whether the file signature is not among the list of known file signatures. If the answer in step 304 is no (i.e., the file signature is among those known), then the real type property 616 of the file is set to "not graphics" in step 306. As with all property settings, it will be understood by those skilled in the art that the actual setting can be in the form of a character array (or string) or a unique boolean, integer or real value specifically designated for that purpose. If the file signature is still unknown (i.e., the file signature was not among the library of known file signatures), then either the first 132 8-byte characters or the entire file (whichever is less) is read into a buffer memory. The contents of the buffer memory are sent through a graphics file filter in step 308. The graphics file filter determines, if possible, the correct file signature of the file assuming the file is a graphics file. In step 310, it is determined whether or not the correct file signature has been determined in step 308. If the filter finds a known graphics type, then the file's real type property 616 is set to graphics in step 314. Otherwise, the file's real type property 616 is set to unknown in step 312.

Referring still to FIG. 3, in step 316, the file suffix of the file name is read into the file suffix property 612 of the file properties record 600. The file suffix is typically the last three characters of the file name that come after the final "." character. Typical file name suffixes include, but are not limited to: ".exe," ".dll," ".bat," ".tif," ".gif," ".pcx," ".bmp," ".jpg," ".com," ".doc," ".htm," and ".wpd". The file suffix is used as a handy way to differentiate between different files and different file formats. In step 316, the file suffix property 612 is compared to the real type property 616 in order to determine if the file signature does not correlate to the file suffix. This determination is made in step 318. If the answer in step 318 is no, i.e. the file suffix property 612 is equivalent to the real type property 616, then the claimed type property 618 is set equivalent to the real type property 616 in step 320. If the answer to step 318 is yes, then the file suffix 612 is compared to a library or list of known file suffixes in step 322. The library of known suffixes contains an exhaustive list of suffixes as well as the file type normally associated with that suffix (e.g., ile type in the library of suffixes for the matching suffix. If, in step 324, no match was found in the library of suffixes, then the claimed type property 618 is set to unknown.

Additional processing is illustrated in FIG. 4. In step 402, the claimed type property 618 is compared to the real type property 616. If the real type property 616 is not equivalent to the claimed type property 618 then a determination is made in step 404 to see whether or not the claimed type property 618 is set to not graphics. If the answer in step 404 is no, then the result type property 620 is set to questionable and the color code property 608 is set to yellow in step 406. If the answer in step 404 is yes, i.e., the claimed type property 618 is set to not graphics, then the result type property 620 is set to suspicious and the color code property 608 is set to red.

Still referring to FIG. 4, if the answer to step 402 is yes, i.e., the claim type property 618 is equivalent to the real type property 616, then a check is made to determine if the file is a hidden file in step 410. If the file is a hidden file then the result property 620 is set to questionable and the color code property 608 is set to yellow in step 412. Otherwise, the color code property 608 is set to blue and the result property 620 is set to okay. All of the files are listed onto display 12 and are sorted in order of severity, with the suspicious files listed first, the questionable files listed next, and the okay files listed last. For each file listed, the reason why the file is either suspicious or questionable is provided by setting the reason property 614 to one of the reasons in the following list:

"This file type cannot be identified.";

"This claims to be, and is a picture.";

"This hidden file contains a picture.";

"This file claims to be one thing (by its name) but is something else.";

"This file is labeled as a program but is really a picture.";

"This file is labeled as a picture but is really a program.";

"This text file contains words that match your criteria.";

"This picture is labeled as one type but is really another.";

"This file appears to contain an audio clip.";

"This hidden file contains an audio clip."; and

"This file claims to be one thing (by its name) but is an audio clip."

The handling of a text document (text file) according to step 212 of FIG. 2 is more fully illustrated in FIG. 5. Text documents, as mentioned before, can contain text, graphics and audio clips. In the preferred embodiment of the present invention, the user is presented with the option of performing an exhaustive search of all text files in order to find any and all graphic images and audio clips that may be embedded within a large text document. As an alternative to the exhaustive search, the user, in the preferred embodiment of the present invention, is able to select a cursory search where only a portion of each text file is searched for graphic images, audio clips and offensive text. In the preferred embodiment of the present invention, switches are also provided to search or not search for the following categories of potentially objectionable material in text files:

Sexually Explicit (material containing graphic descriptions of sexual intercourse or sexually related activities);

Computer Hacking (words or terms that are likely to appear in material that discusses unauthorized access to other computers, over networks or telephone lines);

Drugs/Substance abuse (words or terms that are likely to appear in material that discusses use of illicit drugs and other dangerous substances);

Physically harmful (words or terms that are likely to appear in material that discusses actions that may be harmful to children or to others such as guns, or instructions on how to make explosives); and

Potentially Illegal (words or terms that are likely to appear in material that discusses actions that may be against local, state, or federal laws).

Referring now to FIG. 5, the text file is processed in the following manner. In step 502, the file is first opened for reading. In the preferred embodiment of the present invention, the file is opened so that other programs can open and share the contents of the file. In step 504, either the first 132 8-byte characters are read, or the entire file is read into the buffer memory. If the file is less than 132 characters long, then the entire file is read. Only when a cursory search is requested and the file is in less than 132 characters long are all of the characters read. If the user has designated that an exhaustive search be conducted, the entire file is loaded into the buffer memory. Once loaded into the buffer memory, the file is closed in step 504 to allow processing by other software programs.

Step 508 of FIG. 5 comprises a loop wherein all words contained in the document are compared to the words or terms in a text dictionary. The text dictionary is actually a series of dictionaries, one for each type of objectionable subject matter (e.g., sexually explicit, hacking, etc.). Every word that is contained within the buffer memory is compared to each of the words or terms in the various dictionaries. The user can select which dictionaries will be referred to via the switches provided for selecting or de-selecting the particular subject matter. If a word in the text file matches one in a dictionary, then the result of step 510 will be yes and a flag will be set in step 512 indicating that the file contains objectionable material. If the answer to step 510 is no, then the next word in the text file is selected for similar comparison according to step 508.

Once all of the words and terms in the text file have been compared to each of the selected dictionaries according to step 508, then the determination in step 514 is performed. If the answer in step 514 was no (i.e., no objectionable words, graphic images, or audio clips were found) then the result type property 620 is set to okay. If the answer to step 514 was yes (i.e., either objectionable words, a graphic image, or an audio clip were found) then the result type property 620 is set to questionable or suspicious, depending upon the type of word or embedded graphic or audio clip was found.

Once all of the files have been reviewed, a list of the various files are presented on the display 12 for the user's review and, if necessary, destruction or some other action. The files are ordered by their result type property 620 and a color icon is displayed according to the color code property 608 in order to aid the user in distinguishing harmful files from innocuous ones. In the preferred embodiment of the present invention, along with the file's file name property 610, the file size 602, the date time property 604, the mode 606, the reason property 614, and the color code in icon form for the particular result type property 620 is also presented to the user. The user is given the option of printing the list of files to a standard printer (not shown).

Of course, many modifications and adaptions to the present invention could be made to advantage without departing from the spirit of the invention. Further, some features -discussion is intended to be merely illustrative of the invention. Numerous alternative embodiments may be devised by those having ordinary skill in the art without departing from the spirit and scope of the following claims.

Claims (18)

What is claimed is:
1. A process for searching objectional material in a computer system having a computer, a display, a buffer memory, and at least one electronic file storage device capable of storing electronic files, said electronic files having a file name, a file suffix, and a file signature and a record array having a real type property, a claimed type property, and a result type property for each of said electronic files, comprising the steps of:
a) locating said electronic files on each of said storage devices,
b) checking each of said electronic files on each of said storage devices to determine said real type property of said file,
c) if said file checked in step b) is a graphics type file, then identifying said file as a graphics file,
d) if said file checked in step b) is not a graphics type file then interrogating said file to determine if said file contains objectionable material,
e) if said file interrogated in step d) contains objectionable material, then identifying said file as a text file containing objectionable material, and
f) presenting an itemized list of said text files containing objectionable material and said graphics files to a user so that said user may select files for review or destruction,
g) determining said file signature of said electronic file,
h) comparing said file signature to a list of predetermined file signatures, and
i) if said file signature is contained within said list of predetermined file signatures than setting said real type property of said file to non-graphics,
j) comparing a file suffix of said file to said real type property of said file, and
k) if said file suffix is equivalent to said real type property of said file then setting said claimed type property of said file to said real type property of said file,
l) if said real type property of said file is equivalent to said claimed type property of said file then examining said file to determine if said file is a hidden file,
m) if said file is a hidden file, then setting said result type property of said file to questionable.
2. A process for searching for objectionable material in a computer system having a computer, a display, a buffer memory, and at least one electronic file storage device capable of storing electronic files, said electronic files having a file name, a file suffix, and a file signature and a record array having a real type property, a claimed type property, and a result type property for each of said electronic files, comprising the steps of:
a) locating said electronic files on each of said storage devices,
b) checking each of said electronic files on each of said storage devices to determine said real type property of said file,
c) if said file checked in step b) is a graphics type file, then identifying said file as a graphics file,
d) if said file checked in step b) is not a graphics type file then interrogating said file to determine if said file contains objectionable material,
e) if said file interrogated in step d) contains objectionable material, then identifying said file as a text file containing objectionable material, and
f) presenting an itemized list of said text files containing objectionable material and said graphics files to a user so that said user may select files for review or destruction,
g) determining said file signature of said electronic file,
h) comparing said file signature to a list of predetermined file signatures, and
i) if said file signature is contained within said list of predetermined file signatures than setting said real type property of said file to non-graphics
j) comparing a file suffix of said file to said real type property of said file, and
k) if said file suffix is equivalent to said real type property of said file then setting said claimed type property of said file to said real type property of said file,
l) if said real type property of said file is equivalent to said claimed type property of said file then examining said file to determine if said file is a hidden file,
m) if said file is not a hidden file, then setting said result type property of said file to okay.
3. A process for searching objectional material in a computer system having a computer, a display, a buffer memory, and at least one electronic file storage device capable of storing electronic files, said electronic files having a file name, a file suffix, and a file signature and a record array having a real type property, a claimed type property, and a result type property for each of said electronic files, comprising the steps of:
a) locating said electronic files on each of said storage devices,
b) checking each of said electronic files on each of said storage devices to determine said real type property of said file,
c) if said file checked in step b) is a graphics type file, then identifying said file as a graphics file,
d) if said file checked in step b) is not a graphics type file then interrogating said file to determine if said file contains objectionable material,
e) if said file interrogated in step d) contains objectionable material, then identifying said file as a text file containing objectionable material, and
f) presenting an itemized list of said text files containing objectionable material and said graphics files to a user so that said user may select files for review or destruction,
g) determining said file signature of said electronic file,
h) comparing said file signature to a list of predetermined file signatures, and
i) if said file signature is contained within said list of predetermined file signatures than setting said real type property of said file to non-graphics,
j) comparing a file suffix of said file to said real type property of said file, and
k) if said file suffix is not equivalent to said real type property of said file then comparing said file suffix to a predetermined list of file suffixes,
l) if said file suffix is not contained within said pre-determined list of file suffixes then setting said claimed type property of said file to unknown,
m) if said real type property of said file is equivalent to said claimed type property of said file then examining said file to determine if said file is a hidden file,
n) if said file is a hidden file, then setting said result type property of said file to questionable.
4. A process for searching for objectionable material in a computer system having a computer, a display, a buffer memory, and at least one electronic file storage device capable of storing electronic files, said electronic files having a file name, a file suffix, and a file signature and a record array having a real type property, a claimed type property, and a result type property for each of said electronic files, comprising the steps of:
a) locating said electronic files on each of said storage devices,
b) checking each of said electronic files on each of said storage devices to determine said real type property of said file,
c) if said file checked in step b) is a graphics type file, then identifying said file as a graphics file,
d) if said file checked in step b) is not a graphics type file then interrogating said file to determine if said file contains objectionable material,
e) if said file interrogated in step d) contains objectionable material, then identifying said file as a text file containing objectionable material, and
f) presenting an itemized list of said text files containing objectionable material and said graphics files to a user so that said user may select files for review or destruction,
g) determining said file signature of said electronic file,
h) comparing said file signature to a list of predetermined file signatures, and
i) if said file signature is contained within said list of predetermined file signatures than setting said real type property of said file to non-graphics
j) comparing a file suffix of said file to said real type property of said file, and
k) if said file suffix is not equivalent to said real type property of said file then comparing said file suffix to a predetermined list of file suffixes,
l) if said file suffix is not contained within said pre-determined list of file suffixes then setting said claimed type property of said file to unknown,
m) if said real type property of said file is equivalent to said claimed type property of said file then examining said file to determine if said file is a hidden file,
n) if said file is not a hidden file, then setting said result type property of said file to okay.
5. A process for searching for objectionable material in a computer system having a computer, a display, a buffer memory, and at least one electronic file storage device capable of storing electronic files, said electronic files having a file name, a file suffix, and a file signature and a record array having a real type property, a claimed type property, and a result type property for each of said electronic files, comprising the steps of:
a) locating said electronic files on each of said storage devices,
b) checking each of said electronic files on each of said storage devices to determine said real type property of said file,
c) if said file checked in step b) is a graphics type file, then identifying said file as a graphics file,
d) if said file checked in step b) is not a graphics type file then interrogating said file to determine if said file contains objectionable material,
e) if said file interrogated in step d) contains objectionable material, then identifying said file as a text file containing objectionable material, and
f) presenting an itemized list of said text files containing objectionable material and said graphics files to a user so that said user may select files for review or destruction,
g) determining said file signature of said electronic file,
h) comparing said file signature to a list of predetermined file signatures, and
i) if said file signature is contained within said list of predetermined file signatures than setting said real type property of said file to non-graphics
j) comparing a file suffix of said file to said real type property of said file, and
k) if said file suffix is not equivalent to said real type property of said file then comparing said file suffix to a predetermined list of file suffixes,
l) if said file suffix is contained within said pre-determined list of file suffixes then setting said claimed type property of said file to a file type of a suffix on said pre-determined list of file suffixes that matched said file suffix
m) if said real type property of said file is equivalent to said claimed type property of said file then examining said file to determine if said file is a hidden file,
n) if said file is a hidden file, then setting said result type property of said file to questionable.
6. A process for searching for objectionable material in a computer system having a computer, a display, a buffer memory, and at least one electronic file storage device capable of storing electronic files, said electronic files having a file name, a file suffix, and a file signature and a record array having a real type property, a claimed type property, and a result type property for each of said electronic files, comprising the steps of:
a) locating said electronic files on each of said storage devices,
b) checking each of said electronic files on each of said storage devices to determine said real type property of said file,
c) if said file checked in step b) is a graphics type file, then identifying said file as a graphics file,
d) if said file checked in step b) is not a graphics type file then interrogating said file to determine if said file contains objectionable material,
e) if said file interrogated in step d) contains objectionable material, then identifying said file as a text file containing objectionable material, and
f) presenting an itemized list of said text files containing objectionable material and said graphics files to a user so that said user may select files for review or destruction,
g) determining said file signature of said electronic file,
h) comparing said file signature to a list of predetermined file signatures, and
i) if said file signature is contained within said list of predetermined file signatures than setting said real type property of said file to non-graphics
j) comparing a file suffix of said file to said real type property of said file, and
k) if said file suffix is not equivalent to said real type property of said file then comparing said file suffix to a predetermined list of file suffixes,
l) if said file suffix is contained within said pre-determined list of file suffixes then setting said claimed type property of said file to a file type of a suffix on said pre-determined list of file suffixes that matched said file suffix
m) if said real type property of said file is equivalent to said claimed type property of said file then examining said file to determine if said file is a hidden file,
n) if said file is not a hidden file, then setting said result type property of said file to okay.
7. A process for searching for objectionable material in a computer system having a computer, a display, a buffer memory, and at least one electronic file storage device capable of storing electronic files, said electronic files having a file name, a file suffix, and a file signature and a record array having a real type property, a claimed type property, and a result type property for each of said electronic files, comprising the steps of:
a) locating said electronic files on each of said storage devices,
b) checking each of said electronic files on each of said storage devices to determine said real type property of said file,
c) if said file checked in step b) is a graphics type file, then identifying said file as a graphics file,
d) if said file checked in step b) is not a graphics type file then interrogating said file to determine if said file contains objectionable material,
e) if said file interrogated in step d) contains objectionable material, then identifying said file as a text file containing objectionable material, and
f) presenting an itemized list of said text files containing objectionable material and said graphics files to a user so that said user may select files for review or destruction,
g) determining a file signature of said electronic file,
h) comparing said file signature to a list of predetermined file signatures, and
i) if said file signature is not contained within said list of predetermined file signatures, then sending said file through a graphics file filter in order to determine if said file is a graphics file, and
j) if said file is determined to be a graphics file in step i) then setting said real type property of said file to graphics
k) comparing a file suffix of said file to said real type property of said file, and
l) if said file suffix is equivalent to said real type property of said file then setting said claimed type property of said file to said real type property of said file,
m) if said real type property of said file is equivalent to said claimed type property of said file then examining said file to determine if said file is a hidden file,
n) if said file is a hidden file, then setting said result type property of said file to questionable.
8. A process for searching for objectionable material in a computer system having a computer, a display, a buffer memory, and at least one electronic file storage device capable of storing electronic files, said electronic files having a file name, a file suffix, and a file signature and a record array having a real type property, a claimed type property, and a result type property for each of said electronic files, comprising the steps of:
a) locating said electronic files on each of said storage devices,
b) checking each of said electronic files on each of said storage devices to determine said real type property of said file,
c) if said file checked in step b) is a graphics type file, then identifying said file as a graphics file,
d) if said file checked in step b) is not a graphics type file then interrogating said file to determine if said file contains objectionable material,
e) if said file interrogated in step d) contains objectionable material, then identifying said file as a text file containing objectionable material, and
f) presenting an itemized list of said text files containing objectionable material and said graphics files to a user so that said user may select files for review or destruction
g) determining a file signature of said electronic file,
h) comparing said file signature to a list of predetermined file signatures, and
i) if said file signature is not contained within said list of predetermined file signatures, then sending said file through a graphics file filter in order to determine if said file is a graphics file, and
j) if said file is determined to be a graphics file in step i) then setting said real type property of said file to graphics,
k) comparing a file suffix of said file to said real type property of said file, and
l) if said file suffix is equivalent to said real type property of said file then setting said claimed type property of said file to said real type property of said file,
m) if said real type property of said file is equivalent to said claimed type property of said file, then examining said file to determine if said file is a hidden file,
n) if said file is not a hidden file, then setting said result type property of said file to okay.
9. A process for searching for objectionable material in a computer system having a computer, a display, a buffer memory, and at least one electronic file storage device capable of storing electronic files, said electronic files having a file name, a file suffix, and a file signature and a record array having a real type property, a claimed type property, and a result type property for each of said electronic files, comprising the steps of:
a) locating said electronic files on each of said storage devices,
b) checking each of said electronic files on each of said storage devices to determine said real type property of said file,
c) if said file checked in step b) is a graphics type file, then identifying said file as a graphics file,
d) if said file checked in step b) is not a graphics type file then interrogating said file to determine if said file contains objectionable material,
e) if said file interrogated in step d) contains objectionable material, then identifying said file as a text file containing objectionable material, and
f) presenting an itemized list of said text files containing objectionable material and said graphics files to a user so that said user may select files for review or destruction
g) determining a file signature of said electronic file,
h) comparing said file signature to a list of predetermined file signatures, and
i) if said file signature is not contained within said list of predetermined file signatures, then sending said file through a graphics file filter in order to determine if said file is a graphics file, and
j) if said file is determined to be a graphics file in step i) then setting said real type property of said file to graphics
k) comparing a file suffix of said file to said real type property of said file,
l) if said file suffix is not equivalent to said real type property of said file then comparing said file suffix to a predetermined list of file suffixes, and
m) if said file suffix is not contained within said predetermined list of file suffixes then setting said claimed type property of said file to unknown,
n) if said real type property of said file is equivalent to said claimed type property of said file then examining said file to determine if said file is a hidden file,
o) if said file is a hidden file then setting said result type property of said file to questionable.
10. A process for searching for objectionable material in a computer system having a computer, a display, a buffer memory, and at least one electronic file storage device capable of storing electronic files, said electronic files having a file name, a file suffix, and a file signature and a record array having a real type property, a claimed type property, and a result type property for each of said electronic files, comprising the steps of:
a) locating said electronic files on each of said storage devices,
b) checking each of said electronic files on each of said storage devices to determine said real type property of said file,
c) if said file checked in step b) is a graphics type file, then identifying said file as a graphics file,
d) if said file checked in step b) is not a graphics type file then interrogating said file to determine if said file contains objectionable material,
e) if said file interrogated in step d) contains objectionable material, then identifying said file as a text file containing objectionable material, and
f) presenting an itemized list of said text files containing objectionable material and said graphics files to a user so that said user may select files for review or destruction
g) determining a file signature of said electronic file,
h) comparing said file signature to a list of predetermined file signatures, and
i) if said file signature is not contained within said list of predetermined file signatures, then sending said file through a graphics file filter in order to determine if said file is a graphics file, and
j) if said file is determined to be a graphics file in step i) then setting said real type property of said file to graphics,
k) comparing a file suffix of said file to said real type property of said file,
l) if said file suffix is not equivalent to said real type property of said file then comparing said file suffix to a predetermined list of file suffixes, and
m) if said file suffix is not contained within said predetermined list of file suffixes then setting said claimed type property of said file to unknown,
n) if said real type property of said file is not equivalent to said claimed type property of said file, and if said claimed type property of said file is equivalent to graphics, then setting said result type property of said file to suspicious.
11. A process for searching for objectionable material in a computer system having a computer, a display, a buffer memory, and at least one electronic file storage device capable of storing electronic files, said electronic files having a file name, a file suffix, and a file signature and a record array having a real type property, a claimed type property, and a result type property for each of said electronic files, comprising the steps of:
a) locating said electronic files on each of said storage devices,
b) checking each of said electronic files on each of said storage devices to determine said real type property of said file,
c) if said file checked in step b) is a graphics type file, then identifying said file as a graphics file,
d) if said file checked in step b) is not a graphics type file then interrogating said file to determine if said file contains objectionable material,
e) if said file interrogated in step d) contains objectionable material, then identifying said file as a text file containing objectionable material, and
f) presenting an itemized list of said text files containing objectionable material and said graphics files to a user so that said user may select files for review or destruction
g) determining a file signature of said electronic file,
h) comparing said file signature to a list of predetermined file signatures, and
i) if said file signature is not contained within said list of predetermined file signatures, then sending said file through a graphics file filter in order to determine if said file is a graphics file, and
j) if said file is determined to be a graphics file in step i) then setting said real type property of said file to graphics
k) comparing a file suffix of said file to said real type property of said file,
l) if said file suffix is not equivalent to said real type property of said file then comparing said file suffix to a predetermined list of file suffixes, and
m) if said file suffix is contained within said predetermined list of file suffixes then setting said claimed type property of said file to a file type of a suffix on said pre-determined list of file suffixes that matched said file suffix,
n) if said real type property of said file is equivalent to said claimed type property of said file then examining said file to determine if said file is a hidden file,
o) if said file is a hidden file, then setting said result type property of said file to questionable.
12. A process for searching for objectionable material in a computer system having a computer, a display, a buffer memory, and at least one electronic file storage device capable of storing electronic files, said electronic files having a file name, a file suffix, and a file signature and a record array having a real type property, a claimed type property, and a result type property for each of said electronic files, comprising the steps of:
a) locating said electronic files on each of said storage devices,
b) checking each of said electronic files on each of said storage devices to determine said real type property of said file,
c) if said file checked in step b) is a graphics type file, then identifying said file as a graphics file,
d) if said file checked in step b) is not a graphics type file then interrogating said file to determine if said file contains objectionable material,
e) if said file interrogated in step d) contains objectionable material, then identifying said file as a text file containing objectionable material, and
f) presenting an itemized list of said text files containing objectionable material and said graphics files to a user so that said user may select files for review or destruction
g) determining a file signature of said electronic file,
h) comparing said file signature to a list of predetermined file signatures, and
i) if said file signature is not contained within said list of predetermined file signatures, then sending said file through a graphics file filter in order to determine if said file is a graphics file, and
j) if said file is determined to be a graphics file in step i) then setting said real type property of said file to graphics
k) comparing a file suffix of said file to said real type property of said file,
l) if said file suffix is not equivalent to said real type property of said file then comparing said file suffix to a predetermined list of file suffixes, and
m) if said file suffix is contained within said predetermined list of file suffixes then setting said claimed type property of said file to a file type of a suffix on said pre-determined list of file suffixes that matched said file suffix,
n) if said real type property of said file is equivalent to said claimed type property of said file then examining said file to determine if said file is a hidden file,
o) if said file is not a hidden file, then setting said result type property of said file to okay.
13. A process for searching for objectionable material in a computer system having a computer, a display, a buffer memory, and at least one electronic file storage device capable of storing electronic files, said electronic files having a file name, a file suffix, and a file signature and a record array having a real type property, a claimed type property, and a result type property for each of said electronic files, comprising the steps of:
a) locating said electronic files on each of said storage devices,
b) checking each of said electronic files on each of said storage devices to determine said real type property of said file,
c) if said file checked in step b) is a graphics type file, then identifying said file as a graphics file,
d) if said file checked in step b) is not a graphics type file then interrogating said file to determine if said file contains objectionable material,
e) if said file interrogated in step d) contains objectionable material, then identifying said file as a text file containing objectionable material, and
f) presenting an itemized list of said text files containing objectionable material and said graphics files to a user so that said user may select files for review or destruction
g) determining a file signature of said electronic file,
h) comparing said file signature to a list of predetermined file signatures, and
i) if said file signature is not contained within said list of predetermined file signatures, then sending said file through a graphics file filter in order to determine if said file is a graphics file, and
j) if said file is determined to be a graphics file in step i) then setting said real type property of said file to graphics,
k) comparing a file suffix of said file to said real type property of said file, and
l) if said file suffix is equivalent to said real type property of said file then setting said claimed type property of said file to said real type property of said file,
m) if said real type property of said file is equivalent to said claimed type property of said file then examining said file to determine if said file is a hidden file,
n) if said file is a hidden file, then setting said result type property of said file to questionable.
14. A process for searching for objectionable material in a computer system having a computer, a display, a buffer memory, and at least one electronic file storage device capable of storing electronic files, said electronic files having a file name, a file suffix, and a file signature and a record array having a real type property, a claimed type property, and a result type property for each of said electronic files, comprising the steps of:
a) locating said electronic files on each of said storage devices,
b) checking each of said electronic files on each of said storage devices to determine said real type property of said file,
c) if said file checked in step b) is a graphics type file, then identifying said file as a graphics file,
d) if said file checked in step b) is not a graphics type file then interrogating said file to determine if said file contains objectionable material,
e) if said file interrogated in step d) contains objectionable material, then identifying said file as a text file containing objectionable material, and
f) presenting an itemized list of said text files containing objectionable material and said graphics files to a user so that said user may select files for review or destruction,
g) determining a file signature of said electronic file,
h) comparing said file signature to a list of predetermined file signatures, and
i) if said file signature is not contained within said list of predetermined file signatures, then sending said file through a graphics file filter in order to determine if said file is a graphics file, and
j) if said file is determined to be a graphics file in step i) then setting said real type property of said file to graphics
k) comparing a file suffix of said file to said real type property of said file, and
l) if said file suffix is equivalent to said real type property of said file then setting said claimed type property of said file to said real type property of said file,
m) if said real type property of said file is equivalent to said claimed type property of said file then examining said file to determine if said file is a hidden file,
n) if said file is not a hidden file, then setting said result type property of said file to okay.
15. A process for searching for objectionable material in a computer system having a computer, a display, a buffer memory, and at least one electronic file storage device capable of storing electronic files, said electronic files having a file name, a file suffix, and a file signature and a record array having a real type property, a claimed type property, and a result type property for each of said electronic files, comprising the steps of:
a) locating said electronic files on each of said storage devices,
b) checking each of said electronic files on each of said storage devices to determine said real type property of said file,
c) if said file checked in step b) is a graphics type file, then identifying said file as a graphics file,
d) if said file checked in step b) is not a graphics type file then interrogating said file to determine if said file contains objectionable material,
e) if said file interrogated in step d) contains objectionable material, then identifying said file as a text file containing objectionable material, and
f) presenting an itemized list of said text files containing objectionable material and said graphics files to a user so that said user may select files for review or destruction
g) determining a file signature of said electronic file,
h) comparing said file signature to a list of predetermined file signatures, and
i) if said file signature is not contained within said list of predetermined file signatures, then sending said file through a graphics file filter in order to determine if said file is a graphics file, and
j) if said file is determined to be a graphics file in step i) then setting said real type property of said file to graphics,
k) comparing a file suffix of said file to said real type property of said file,
l) if said file suffix is not equivalent to said real type property of said file then comparing said file suffix to a predetermined list of file suffixes, and
m) if said file suffix is not contained within said predetermined list of file suffixes then setting said claimed type property of said file to unknown,
n) if said real type property of said file is equivalent to said claimed type property of said file then examining said file to determine if said file is a hidden file,
o) if said file is a hidden file, then setting said result type property of said file to questionable.
16. A process for searching for objectionable material in a computer system having a computer, a display, a buffer memory, and at least one electronic file storage device capable of storing electronic files, said electronic files having a file name, a file suffix, and a file signature and a record array having a real type property, a claimed type property, and a result type property for each of said electronic files, comprising the steps of:
a) locating said electronic files on each of said storage devices,
b) checking each of said electronic files on each of said storage devices to determine said real type property of said file,
c) if said file checked in step b) is a graphics type file, then identifying said file as a graphics file,
d) if said file checked in step b) is not a graphics type file then interrogating said file to determine if said file contains objectionable material,
e) if said file interrogated in step d) contains objectionable material, then identifying said file as a text file containing objectionable material, and
f) presenting an itemized list of said text files containing objectionable material and said graphics files to a user so that said user may select files for review or destruction
g) determining a file signature of said electronic file,
h) comparing said file signature to a list of predetermined file signatures, and
i) if said file signature is not contained within said list of predetermined file signatures, then sending said file through a graphics file filter in order to determine if said file is a graphics file, and
j) if said file is determined to be a graphics file in step i) then setting said real type property of said file to graphics
k) comparing a file suffix of said file to said real type property of said file,
l) if said file suffix is not equivalent to said real type property of said file then comparing said file suffix to a predetermined list of file suffixes, and
m) if said file suffix is not contained within said predetermined list of file suffixes then setting said claimed type property of said file to unknown,
n) if said real type property of said file is equivalent to said claimed type property of said file, then examining said file to determine if said file is a hidden file,
o) if said file is not a hidden file, then setting said result type property of said file to okay.
17. A process for searching for objectionable material in a computer system having a computer, a display, a buffer memory, and at least one electronic file storage device capable of storing electronic files, said electronic files having a file name, a file suffix, and a file signature and a record array having a real type property, a claimed type property, and a result type property for each of said electronic files, comprising the steps of:
a) locating said electronic files on each of said storage devices,
b) checking each of said electronic files on each of said storage devices to determine said real type property of said file,
c) if said file checked in step b) is a graphics type file, then identifying said file as a graphics file,
d) if said file checked in step b) is not a graphics type file then interrogating said file to determine if said file contains objectionable material,
e) if said file interrogated in step d) contains objectionable material, then identifying said file as a text file containing objectionable material, and
f) presenting an itemized list of said text files containing objectionable material and said graphics files to a user so that said user may select files for review or destruction
g) determining a file signature of said electronic file,
h) comparing said file signature to a list of predetermined file signatures, and
i) if said file signature is not contained within said list of predetermined file signatures, then sending said file through a graphics file filter in order to determine if said file is a graphics file, and
j) if said file is determined to be a graphics file in step i) then setting said real type property of said file to graphics
k) comparing a file suffix of said file to said real type property of said file,
l) if said file suffix is not equivalent to said real type property of said file then comparing said file suffix to a predetermined list of file suffixes, and
m) if said file suffix is contained within said pre-determined list of file suffixes then setting said claimed type property of said file to a file type of a suffix on said pre-determined list of file suffixes that matched said file suffix
n) if said real type property of said file is equivalent to said claimed type property of said file then examining said file to determine if said file is a hidden file,
o) if said file is not a hidden file, then setting said result type property of said file to questionable.
18. A process for searching for objectionable material in a computer system having a computer, a display, a buffer memory, and at least one electronic file storage device capable of storing electronic files, said electronic files having a file name, a file suffix, and a file signature and a record array having a real type property, a claimed type property, and a result type property for each of said electronic files, comprising the steps of:
a) locating said electronic files on each of said storage devices,
b) checking each of said electronic files on each of said storage devices to determine said real type property of said file,
c) if said file checked in step b) is a graphics type file, then identifying said file as a graphics file,
d) if said file checked in step b) is not a graphics type file then interrogating said file to determine if said file contains objectionable material,
e) if said file interrogated in step d) contains objectionable material, then identifying said file as a text file containing objectionable material, and
f) presenting an itemized list of said text files containing objectionable material and said graphics files to a user so that said user may select files for review or destruction,
g) determining a file signature of said electronic file,
h) comparing said file signature to a list of predetermined file signatures, and
i) if said file signature is not contained within said list of predetermined file signatures, then sending said file through a graphics file filter in order to determine if said file is a graphics file, and
j) if said file is determined to be a graphics file in step i) then setting said real type property of said file to graphics,
k) comparing a file suffix of said file to said real type property of said file,
l) if said file suffix is not equivalent to said real type property of said file then comparing said file suffix to a predetermined list of file suffixes, and
m) if said file suffix is contained within said pre-determined list of file suffixes then setting said claimed type property of said file to a file type of a suffix on said pre-determined list of file suffixes that matched said file suffix
n) if said real type property of said file is equivalent to said claimed type property of said file then examining said file to determine if said file is a hidden file,
o) if said file is not a hidden file, then setting said result type property of said file to okay.
US08/802,118 1997-02-19 1997-02-19 Electronic file analyzer and selector Expired - Lifetime US5848418A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US08/802,118 US5848418A (en) 1997-02-19 1997-02-19 Electronic file analyzer and selector

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US08/802,118 US5848418A (en) 1997-02-19 1997-02-19 Electronic file analyzer and selector

Publications (1)

Publication Number Publication Date
US5848418A true US5848418A (en) 1998-12-08

Family

ID=25182880

Family Applications (1)

Application Number Title Priority Date Filing Date
US08/802,118 Expired - Lifetime US5848418A (en) 1997-02-19 1997-02-19 Electronic file analyzer and selector

Country Status (1)

Country Link
US (1) US5848418A (en)

Cited By (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1120959A1 (en) * 2000-01-24 2001-08-01 Canon Research Centre-France S.A. Method and device for managing the resources of a computer communication means for processing a computer document
US6324553B1 (en) * 1997-11-26 2001-11-27 International Business Machines Corporation Apparatus and method for the manual selective blocking of images
US6356924B2 (en) 1997-11-26 2002-03-12 International Business Machines Corporation Configurable disablement of display objects in a browser
US6446119B1 (en) * 1997-08-07 2002-09-03 Laslo Olah System and method for monitoring computer usage
US20030014444A1 (en) * 2001-06-27 2003-01-16 Martin Wu Discriminating system for a pornographic file and the discriminating method
US6574729B1 (en) * 1999-08-26 2003-06-03 Lucent Technologies Inc. System for remotely identifying and providing information of unknown software on remote network node by comparing the unknown software with software audit file maintained on server
US20030105815A1 (en) * 2001-12-05 2003-06-05 Ibm Corporation Apparatus and method for monitoring and analyzing instant messaging account transcripts
US20030105822A1 (en) * 2001-12-05 2003-06-05 Ibm Corporation Apparatus and method for monitoring instant messaging accounts
US6585779B1 (en) * 1997-11-20 2003-07-01 International Business Machines Corporation Method and apparatus for determining and categorizing Java Bean names and sub-elements files
US20030123465A1 (en) * 2001-12-28 2003-07-03 Hughes Electronics Corporation System and method for content filtering using static source routes
US6625730B1 (en) 2000-03-31 2003-09-23 Hewlett-Packard Development Company, L.P. System for validating a bios program and memory coupled therewith by using a boot block program having a validation routine
US6625729B1 (en) 2000-03-31 2003-09-23 Hewlett-Packard Company, L.P. Computer system having security features for authenticating different components
US6629109B1 (en) * 1999-03-05 2003-09-30 Nec Corporation System and method of enabling file revision management of application software
US6651076B1 (en) * 1999-05-19 2003-11-18 Cablynx, Inc. Archive computer system and method for storage and retrieval of records
US20040002962A1 (en) * 2002-06-27 2004-01-01 International Business Machines Corporation Iconic representation of linked site characteristics
US20040044529A1 (en) * 2002-08-27 2004-03-04 Akihiko Murakami Moral standard protecting system in voice and/or text communication and interactive game system using therewith
US20040107089A1 (en) * 1998-01-27 2004-06-03 Gross John N. Email text checker system and method
US20040143764A1 (en) * 2003-01-13 2004-07-22 Kartik Kaleedhass System and method of preventing the transmission of known and unknown electronic content to and from servers or workstations connected to a common network
US20040249626A1 (en) * 2003-06-03 2004-12-09 Neal Richard S. Method for modifying English language compositions to remove and replace objectionable sexist word forms
US20050022229A1 (en) * 2003-07-25 2005-01-27 Michael Gabriel Content access control
US20050027987A1 (en) * 2003-08-01 2005-02-03 Neufeld E. David Method and apparatus to provide secure communication between systems
US20050060541A1 (en) * 2003-09-11 2005-03-17 Angelo Michael F. Method and apparatus for providing security for a computer system
US20050114218A1 (en) * 1996-01-17 2005-05-26 Privacy Infrastructure, Inc. Third party privacy system
US20050166024A1 (en) * 2004-01-26 2005-07-28 Angelo Michael F. Method and apparatus for operating multiple security modules
US20050163317A1 (en) * 2004-01-26 2005-07-28 Angelo Michael F. Method and apparatus for initializing multiple security modules
US20050240621A1 (en) * 2000-05-22 2005-10-27 Mci, Inc. Method and system for managing partitioned data resources
US7039856B2 (en) * 1998-09-30 2006-05-02 Ricoh Co., Ltd. Automatic document classification using text and images
US7073064B1 (en) 2000-03-31 2006-07-04 Hewlett-Packard Development Company, L.P. Method and apparatus to provide enhanced computer protection
US20060253784A1 (en) * 2001-05-03 2006-11-09 Bower James M Multi-tiered safety control system and methods for online communities
US20090043832A1 (en) * 2007-05-03 2009-02-12 Kivati Software, Llc Method of determining and storing the state of a computer system
CN100462990C (en) 2005-12-12 2009-02-18 北京瑞星国际软件有限公司 Method and device for monitoring suspicious file start
US20090207750A1 (en) * 2006-07-19 2009-08-20 Chronicle Solutions (Uk) Limited Network monitoring based on pointer information
US7631332B1 (en) 1998-06-05 2009-12-08 Decisionmark Corp. Method and system for providing household level television programming information
US20100125586A1 (en) * 2008-11-18 2010-05-20 At&T Intellectual Property I, L.P. Parametric Analysis of Media Metadata
CN101276391B (en) 2007-03-27 2010-12-08 鸿富锦精密工业(深圳)有限公司;鸿海精密工业股份有限公司 Picture and file virus defense system and method
US7895651B2 (en) 2005-07-29 2011-02-22 Bit 9, Inc. Content tracking in a network security system
US7913287B1 (en) 2001-06-15 2011-03-22 Decisionmark Corp. System and method for delivering data over an HDTV digital television spectrum
US7953087B1 (en) 2001-12-28 2011-05-31 The Directv Group, Inc. Content filtering using static source routes
US8010981B2 (en) 2001-02-08 2011-08-30 Decisionmark Corp. Method and system for creating television programming guide
US20120023181A1 (en) * 2004-08-31 2012-01-26 Research In Motion Limited Method for viewing document information on a mobile communication device
US8272058B2 (en) 2005-07-29 2012-09-18 Bit 9, Inc. Centralized timed analysis in a network security system
US8984636B2 (en) 2005-07-29 2015-03-17 Bit9, Inc. Content extractor and analysis system
US9239924B2 (en) 1999-04-30 2016-01-19 Intellectual Ventures I Llc Identifying and characterizing electronic files using a two-stage calculation

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5608874A (en) * 1994-12-02 1997-03-04 Autoentry Online, Inc. System and method for automatic data file format translation and transmission having advanced features
US5642509A (en) * 1991-07-25 1997-06-24 Canon Kabushiki Kaisha Data processing apparatus with event notification and picture drawing scheduling
US5706507A (en) * 1995-07-05 1998-01-06 International Business Machines Corporation System and method for controlling access to data located on a content server
US5710918A (en) * 1995-06-07 1998-01-20 International Business Machines Corporation Method for distributed task fulfillment of web browser requests
US5710883A (en) * 1995-03-10 1998-01-20 Stanford University Hypertext document transport mechanism for firewall-compatible distributed world-wide web publishing
US5715397A (en) * 1994-12-02 1998-02-03 Autoentry Online, Inc. System and method for data transfer and processing having intelligent selection of processing routing and advanced routing features

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5642509A (en) * 1991-07-25 1997-06-24 Canon Kabushiki Kaisha Data processing apparatus with event notification and picture drawing scheduling
US5608874A (en) * 1994-12-02 1997-03-04 Autoentry Online, Inc. System and method for automatic data file format translation and transmission having advanced features
US5715397A (en) * 1994-12-02 1998-02-03 Autoentry Online, Inc. System and method for data transfer and processing having intelligent selection of processing routing and advanced routing features
US5710883A (en) * 1995-03-10 1998-01-20 Stanford University Hypertext document transport mechanism for firewall-compatible distributed world-wide web publishing
US5710918A (en) * 1995-06-07 1998-01-20 International Business Machines Corporation Method for distributed task fulfillment of web browser requests
US5706507A (en) * 1995-07-05 1998-01-06 International Business Machines Corporation System and method for controlling access to data located on a content server

Cited By (76)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050114218A1 (en) * 1996-01-17 2005-05-26 Privacy Infrastructure, Inc. Third party privacy system
US6446119B1 (en) * 1997-08-07 2002-09-03 Laslo Olah System and method for monitoring computer usage
US6585779B1 (en) * 1997-11-20 2003-07-01 International Business Machines Corporation Method and apparatus for determining and categorizing Java Bean names and sub-elements files
US6356924B2 (en) 1997-11-26 2002-03-12 International Business Machines Corporation Configurable disablement of display objects in a browser
US6324553B1 (en) * 1997-11-26 2001-11-27 International Business Machines Corporation Apparatus and method for the manual selective blocking of images
US20040107089A1 (en) * 1998-01-27 2004-06-03 Gross John N. Email text checker system and method
US7424674B1 (en) 1998-01-27 2008-09-09 Gross John N Document distribution control system and method based on content
US9665559B2 (en) 1998-01-27 2017-05-30 Kinigos, Llc Word checking tool for selectively filtering text documents for undesirable or inappropriate content as a function of target audience
US20090006950A1 (en) * 1998-01-27 2009-01-01 Gross John N Document Distribution Control System and Method Based on Content
US6782510B1 (en) * 1998-01-27 2004-08-24 John N. Gross Word checking tool for controlling the language content in documents using dictionaries with modifyable status fields
US7631332B1 (en) 1998-06-05 2009-12-08 Decisionmark Corp. Method and system for providing household level television programming information
US7039856B2 (en) * 1998-09-30 2006-05-02 Ricoh Co., Ltd. Automatic document classification using text and images
US6629109B1 (en) * 1999-03-05 2003-09-30 Nec Corporation System and method of enabling file revision management of application software
US9239924B2 (en) 1999-04-30 2016-01-19 Intellectual Ventures I Llc Identifying and characterizing electronic files using a two-stage calculation
US10235442B2 (en) 1999-04-30 2019-03-19 Intellectual Ventures I Llc Method and apparatus for identifying and characterizing errant electronic files
US6651076B1 (en) * 1999-05-19 2003-11-18 Cablynx, Inc. Archive computer system and method for storage and retrieval of records
US20030140266A1 (en) * 1999-08-26 2003-07-24 Lucent Technologies Inc. Method and apparatus for remotely assessing software with automatic maintenance of a software audit file
US6574729B1 (en) * 1999-08-26 2003-06-03 Lucent Technologies Inc. System for remotely identifying and providing information of unknown software on remote network node by comparing the unknown software with software audit file maintained on server
US9111070B2 (en) 1999-08-26 2015-08-18 Sound View Innovations, Llc Method and apparatus for remotely assessing software with automatic maintenance of a software audit file
US20030035122A1 (en) * 2000-01-24 2003-02-20 Stephane Amarger Method and device for managing the resources of a computer communication means for processing a computer document
EP1120959A1 (en) * 2000-01-24 2001-08-01 Canon Research Centre-France S.A. Method and device for managing the resources of a computer communication means for processing a computer document
US7065592B2 (en) 2000-01-24 2006-06-20 Canon Research Centre France S.A. Method and device for managing the resources of a computer communication means for processing a computer document
US6625729B1 (en) 2000-03-31 2003-09-23 Hewlett-Packard Company, L.P. Computer system having security features for authenticating different components
US6625730B1 (en) 2000-03-31 2003-09-23 Hewlett-Packard Development Company, L.P. System for validating a bios program and memory coupled therewith by using a boot block program having a validation routine
US7073064B1 (en) 2000-03-31 2006-07-04 Hewlett-Packard Development Company, L.P. Method and apparatus to provide enhanced computer protection
US20050240621A1 (en) * 2000-05-22 2005-10-27 Mci, Inc. Method and system for managing partitioned data resources
US8010981B2 (en) 2001-02-08 2011-08-30 Decisionmark Corp. Method and system for creating television programming guide
US20060253784A1 (en) * 2001-05-03 2006-11-09 Bower James M Multi-tiered safety control system and methods for online communities
US7913287B1 (en) 2001-06-15 2011-03-22 Decisionmark Corp. System and method for delivering data over an HDTV digital television spectrum
US20030014444A1 (en) * 2001-06-27 2003-01-16 Martin Wu Discriminating system for a pornographic file and the discriminating method
US20030105815A1 (en) * 2001-12-05 2003-06-05 Ibm Corporation Apparatus and method for monitoring and analyzing instant messaging account transcripts
US7032007B2 (en) 2001-12-05 2006-04-18 International Business Machines Corporation Apparatus and method for monitoring instant messaging accounts
US20030105822A1 (en) * 2001-12-05 2003-06-05 Ibm Corporation Apparatus and method for monitoring instant messaging accounts
US7194536B2 (en) * 2001-12-05 2007-03-20 International Business Machines Corporation Apparatus and method for monitoring and analyzing instant messaging account transcripts
US7953087B1 (en) 2001-12-28 2011-05-31 The Directv Group, Inc. Content filtering using static source routes
US20030123465A1 (en) * 2001-12-28 2003-07-03 Hughes Electronics Corporation System and method for content filtering using static source routes
US20060256788A1 (en) * 2001-12-28 2006-11-16 Donahue David B System and method for content filtering using static source routes
US7149219B2 (en) 2001-12-28 2006-12-12 The Directtv Group, Inc. System and method for content filtering using static source routes
US8085774B2 (en) 2001-12-28 2011-12-27 The Directv Group, Inc. System and method for content filtering using static source routes
US20040002962A1 (en) * 2002-06-27 2004-01-01 International Business Machines Corporation Iconic representation of linked site characteristics
US6983273B2 (en) * 2002-06-27 2006-01-03 International Business Machines Corporation Iconic representation of linked site characteristics
US20040044529A1 (en) * 2002-08-27 2004-03-04 Akihiko Murakami Moral standard protecting system in voice and/or text communication and interactive game system using therewith
US7043438B2 (en) * 2002-08-27 2006-05-09 Kabushiki Kaisha Micronet Moral standard protecting system in voice and/or text communication and interactive game system using therewith
US8799644B2 (en) * 2003-01-13 2014-08-05 Karsof Systems Llc System and method of preventing the transmission of known and unknown electronic content to and from servers or workstations connected to a common network
US20040143764A1 (en) * 2003-01-13 2004-07-22 Kartik Kaleedhass System and method of preventing the transmission of known and unknown electronic content to and from servers or workstations connected to a common network
US20040249626A1 (en) * 2003-06-03 2004-12-09 Neal Richard S. Method for modifying English language compositions to remove and replace objectionable sexist word forms
US20050022229A1 (en) * 2003-07-25 2005-01-27 Michael Gabriel Content access control
US8082563B2 (en) 2003-07-25 2011-12-20 Home Box Office, Inc. System and method for content access control through default profiles and metadata pointers
US20050027987A1 (en) * 2003-08-01 2005-02-03 Neufeld E. David Method and apparatus to provide secure communication between systems
US7240201B2 (en) 2003-08-01 2007-07-03 Hewlett-Packard Development Company, L.P. Method and apparatus to provide secure communication between systems
US20050060541A1 (en) * 2003-09-11 2005-03-17 Angelo Michael F. Method and apparatus for providing security for a computer system
US7228432B2 (en) 2003-09-11 2007-06-05 Angelo Michael F Method and apparatus for providing security for a computer system
US7930503B2 (en) 2004-01-26 2011-04-19 Hewlett-Packard Development Company, L.P. Method and apparatus for operating multiple security modules
US20050163317A1 (en) * 2004-01-26 2005-07-28 Angelo Michael F. Method and apparatus for initializing multiple security modules
US20050166024A1 (en) * 2004-01-26 2005-07-28 Angelo Michael F. Method and apparatus for operating multiple security modules
US7382880B2 (en) 2004-01-26 2008-06-03 Hewlett-Packard Development Company, L.P. Method and apparatus for initializing multiple security modules
US8583691B2 (en) * 2004-08-31 2013-11-12 Blackberry Limited Method for viewing document information on a mobile communication device
US20120023181A1 (en) * 2004-08-31 2012-01-26 Research In Motion Limited Method for viewing document information on a mobile communication device
US8984636B2 (en) 2005-07-29 2015-03-17 Bit9, Inc. Content extractor and analysis system
US8272058B2 (en) 2005-07-29 2012-09-18 Bit 9, Inc. Centralized timed analysis in a network security system
US7895651B2 (en) 2005-07-29 2011-02-22 Bit 9, Inc. Content tracking in a network security system
CN100462990C (en) 2005-12-12 2009-02-18 北京瑞星国际软件有限公司 Method and device for monitoring suspicious file start
US20090207750A1 (en) * 2006-07-19 2009-08-20 Chronicle Solutions (Uk) Limited Network monitoring based on pointer information
US8386598B2 (en) * 2006-07-19 2013-02-26 Mcafee, Inc. Network monitoring by using packet header analysis
US20130166583A1 (en) * 2006-07-19 2013-06-27 Stephen Robinson Network monitoring by using packet header analysis
US8954581B2 (en) * 2006-07-19 2015-02-10 Mcafee Inc. Network monitoring by using packet header analysis
US9264378B2 (en) * 2006-07-19 2016-02-16 Mcafee, Inc. Network monitoring by using packet header analysis
US20100057903A1 (en) * 2006-07-19 2010-03-04 Chronicle Solutions (Uk) Limited Network monitoring by using packet header analysis
US20150113135A1 (en) * 2006-07-19 2015-04-23 Mcafee, Inc. Network monitoring by using packet header analysis
US8264976B2 (en) 2006-07-19 2012-09-11 Mcafee, Inc. Network monitoring based on pointer information
CN101276391B (en) 2007-03-27 2010-12-08 鸿富锦精密工业(深圳)有限公司;鸿海精密工业股份有限公司 Picture and file virus defense system and method
US20090043832A1 (en) * 2007-05-03 2009-02-12 Kivati Software, Llc Method of determining and storing the state of a computer system
US8086611B2 (en) 2008-11-18 2011-12-27 At&T Intellectual Property I, L.P. Parametric analysis of media metadata
US9342517B2 (en) 2008-11-18 2016-05-17 At&T Intellectual Property I, L.P. Parametric analysis of media metadata
US20100125586A1 (en) * 2008-11-18 2010-05-20 At&T Intellectual Property I, L.P. Parametric Analysis of Media Metadata
US10095697B2 (en) 2008-11-18 2018-10-09 At&T Intellectual Property I, L.P. Parametric analysis of media metadata

Similar Documents

Publication Publication Date Title
US5649095A (en) Method and apparatus for detecting computer viruses through the use of a scan information cache
CA2299310C (en) Detection and elimination of macro viruses
US6701441B1 (en) System and method for interactive web services
US6522770B1 (en) Management of documents and other objects using optical devices
US5854916A (en) State-based cache for antivirus software
US6065056A (en) System to control content and prohibit certain interactive attempts by a person using a personal computer
US6230288B1 (en) Method of treating whitespace during virus detection
US7565697B2 (en) Systems and methods for preventing unauthorized use of digital content
US8261344B2 (en) Method and system for classification of software using characteristics and combinations of such characteristics
US7251830B1 (en) Process-based selection of virus detection actions system, method and computer program product
JP4299249B2 (en) Duplication prevention device, a program for executing the copy prevention method and method on a computer
US6577920B1 (en) Computer virus screening
US5398196A (en) Method and apparatus for detection of computer viruses
KR100551333B1 (en) Method and apparatus for controlling access to system resources software
EP0443423B1 (en) Method and apparatus for executing trusted-path commands
US6785867B2 (en) Automatic application loading for e-mail attachments
US7237123B2 (en) Systems and methods for preventing unauthorized use of digital content
US6295638B1 (en) Method and apparatus for loading native object code in data processing system
Watson et al. NIST special database 4
US5956481A (en) Method and apparatus for protecting data files on a computer from virus infection
US7191219B2 (en) Self-destructing document and e-mail messaging system
US7568233B1 (en) Detecting malicious software through process dump scanning
US6185684B1 (en) Secured document access control using recipient lists
US7069589B2 (en) Detection of a class of viral code
JP4404246B2 (en) Backup system and method based on data characteristics

Legal Events

Date Code Title Description
AS Assignment

Owner name: WATCHSOFT, INC., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DE SOUZA, PETER ANDRE;ANGELO, MICHAEL F.;REEL/FRAME:008517/0181

Effective date: 19970218

AS Assignment

Owner name: SILICON VALLEY FINANCIAL SERVICES, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WATCHSOFT, INC.;REEL/FRAME:009471/0756

Effective date: 19980805

FPAY Fee payment

Year of fee payment: 4

REMI Maintenance fee reminder mailed
REMI Maintenance fee reminder mailed
REIN Reinstatement after maintenance fee payment confirmed
FP Expired due to failure to pay maintenance fee

Effective date: 20061208

SULP Surcharge for late payment
FPAY Fee payment

Year of fee payment: 8

AS Assignment

Owner name: WATCHSOFT, INC., TEXAS

Free format text: RELEASE;ASSIGNOR:SILICON VALLEY BANK;REEL/FRAME:020442/0208

Effective date: 20080125

PRDP Patent reinstated due to the acceptance of a late maintenance fee

Effective date: 20080418

STCF Information on status: patent grant

Free format text: PATENTED CASE

REMI Maintenance fee reminder mailed
SULP Surcharge for late payment

Year of fee payment: 11

FPAY Fee payment

Year of fee payment: 12